Abstract is missing.
- Protecting Your Smartphone from Theft Using AccelerometerHuiyong Li, Jiannan Yu, Qian Cao. 3-14 [doi]
- SOS - Securing Open SkiesSavio Sciancalepore, Roberto Di Pietro. 15-32 [doi]
- DNS Traffic of a Tor Exit Node - An AnalysisMichael Sonntag. 33-45 [doi]
- SDN-Based Secure VANETs Communication with Fog ComputingMuhammad Arif, Guojun Wang, Tian Wang 0001, Tao Peng. 46-59 [doi]
- Wearable Device Data for Criminal InvestigationSarah Mcnary, Aaron Hunter. 60-71 [doi]
- Authentication of Skyline Query over Road NetworksXiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu. 72-83 [doi]
- A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud ComputingSyed Qasim Afser Rizvi, Guojun Wang, Jianer Chen. 84-97 [doi]
- Processing Analysis of Confidential Modes of OperationYasir Nawaz, Lei Wang, Kamel Ammour. 98-110 [doi]
- Matching Sensor Ontologies Through Compact Evolutionary Tabu Search AlgorithmXingsi Xue, Shijian Liu. 115-124 [doi]
- Event-Triggered Fault-Detection Filter Using Coordinate Transformation Approach for Time-Varying Stochastic SystemsYunji Li, Li Peng, Xuefang Zhu, Wen Li. 125-135 [doi]
- Indoor Interference Classification Based on WiFi Channel State InformationZhuoshi Yang, Yanxiang Wang, Lejun Zhang, Yiran Shen. 136-145 [doi]
- Secure and Privacy Preserving RFID Based Access Control to Smart BuildingsAhmed Raad Al-Sudani, Shang Gao, Sheng Wen, Muhmmad Al-Khiza'ay. 146-155 [doi]
- Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud SystemsMohan Li, Yu Jiang, Yanbin Sun, Zhihong Tian. 156-165 [doi]
- Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud EnvironmentKai Peng, Lixin Zheng, Xiaolong Xu, Tao Lin, Victor C. M. Leung. 166-177 [doi]
- A Four-Stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full CoverageJingbo Xia, Jian Shen, Yaoxiang Wu. 178-191 [doi]
- Application of Sensor-Cloud Systems: Smart Traffic ControlChaogang Tang, Xianglin Wei, Jin Liu. 192-202 [doi]
- Strategy-Proof Mechanism for Provisioning Non-obedient Resources Without PaymentWei Song, Min Li, Shun You. 203-213 [doi]
- Risk Identification-Based Association Rule Mining for Supply Chain Big DataAbdullah Salamai, Morteza Saberi, Md. Omar Khadeer Hussain, Elizabeth Chang. 219-228 [doi]
- TrCMP: An App Usage Inference Method for Mobile Service EnhancementXuan Zhao, Md Zakirul Alam Bhuiyan, Lianyong Qi, Hongli Nie, Wajid Rafique, Wanchun Dou. 229-239 [doi]
- A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replicationShuo Zhang, Ningjiang Chen, Hanlin Zhang, Yijun Xue, Ruwei Huang. 240-250 [doi]
- Cloud Enabled e-Glossary System: A Smart Campus PerspectiveMusaddiq Majid Khan Al-Nadwi, Nadia Refat, Nafees Zaman, Md. Arafatur Rahman, Md. Zakirul Alam Bhuiyan, Ramdan Bin Razali. 251-260 [doi]
- A Dynamic Integrity Transitivity Model for the CloudRongyu He, Haonan Sun, Yong Zhang. 261-271 [doi]
- Enhancing Dependability in Big Data Analytics Enterprise PipelinesHira Zahid, Tariq Mahmood, Nassar Ikram. 272-281 [doi]
- Overview of Logistics Equilibrium Distribution Networks System: An Urban PerspectiveWang Wei, Md. Arafatur Rahman, Md Jahan Ali, Md. Zakirul Alam Bhuiyan, Liu Yao, Hai Tao. 282-293 [doi]
- CRAB: Blockchain Based Criminal Record Management SystemMaisha Afrida Tasnim, Abdullah Al Omar, Mohammad Shahriar Rahman, Md. Zakirul Alam Bhuiyan. 294-303 [doi]
- Secure Passive Keyless Entry and Start System Using Machine LearningUsman Ahmad, Hong Song, Awais Bilal, Mamoun Alazab, Alireza Jolfaei. 304-313 [doi]
- Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender SystemsItishree Mohallick, Katrien De Moor, Özlem Özgöbek, Jon Atle Gulla. 319-330 [doi]
- SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge SharingShangfo Huang, Weifeng Lv, Zhipu Xie, Bo Huang, Bowen Du. 331-340 [doi]
- NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow ConversionBo Huang, Guixi Xiong, Zhipu Xie, Shangfo Huang, Bowen Du. 341-350 [doi]
- BDCP: A Framework for Big Data Copyright Protection Based on Digital WatermarkingJingyue Yang, Haiquan Wang, Zhaoyi Wang, Jieyi Long, Bowen Du. 351-360 [doi]
- A Privacy-Preserving Attribute-Based Access Control SchemeYang Xu 0013, Quanrun Zeng, Guojun Wang, Cheng Zhang, Ju Ren, Yaoxue Zhang. 361-370 [doi]
- Checking an Authentication of Person Depends on RFID with Thermal ImageAhmed Raad Al-Sudani, Shang Gao, Sheng Wen, Muhmmad Al-Khiza'ay. 371-380 [doi]
- Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social NetworksKasra Majbouri Yazdi, Adel Majbouri Yazdi, Saeid Khodayi, Jingyu Hou, Wanlei Zhou, Saeed Saedy. 381-391 [doi]
- An Efficient Provable Multi-copy Data Possession Scheme with Data DynamicsZuojie Deng, Shuhong Chen, Xiaolan Tan, Dan Song, Fan Wu. 392-402 [doi]
- An Enhanced Key Management Scheme for LoRaWANJialuo Han, Jidong Wang. 407-416 [doi]
- Identifying Devices of the Internet of Things Using Machine Learning on Clock CharacteristicsPascal Oser, Frank Kargl, Stefan Lüders. 417-427 [doi]
- A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical SystemsShafiq-Ur Rehman, Volker Gruhn, Saad Shafiq, Irum Inayat. 428-442 [doi]
- Interacting with the Internet of Things Using Smart Contracts and Blockchain TechnologiesNikos Fotiou, Vasilios A. Siris, George C. Polyzos. 443-452 [doi]
- Research on Multi-focus Image Fusion Algorithm Based on QuadtreeSenlin Wang, Junhai Zhou, Qin Liu, Zheng Qin, Panlin Hou. 457-464 [doi]
- Uncertainty Evaluation for Big Data of Mass Standards in a Key ComparisonXiaoping Ren, Fang Nan, Jian Wang. 465-471 [doi]
- Research on Wireless Spectrum Sensing Technology Based on Machine LearningHeng Xiao, Xianchun Zhou, Yue Tian. 472-479 [doi]
- The Safety Detection for Double Tapered Roller Bearing Based on Deep LearningJie Tao, Shaobo Zhang, Dalian Yang. 485-496 [doi]
- Malicious Domain Name Recognition Based on Deep Neural NetworksXiaodan Yan, Baojiang Cui, Jianbin Li. 497-505 [doi]
- Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi SignalsMd. Zakirul Alam Bhuiyan, Md. Monirul Islam, Guojun Wang, Tian Wang 0001. 511-521 [doi]
- E ^2 STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor NetworksLiang Liu, Zhe Xu, Yi-ting Wang, Xiaolin Qin. 522-531 [doi]